skip to main content
10.1145/2413097.2413106acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

On-demand security service

Published: 06 June 2012 Publication History

Abstract

Traditional secure channels use a secure session key to encrypt communication messages within a time limit. For website cases, browsers can not initiate a request for a secure session, and sometimes it is not necessary to encrypt the entire session. Our On-Demand Security Service (ODSS) addresses these problems by designing an "in session" protocol on top of internet and wireless communication protocol. It could be used in gaming, internet browsing, and messaging environments. A service provider opens ODSS as a service, and offers users a choice of applying protection when needed. This approach provides user-defined security and also improves communication efficiency.

References

[1]
Hickman, Kipp, "The SSL Protocol", Netscape Communications Corp., Feb 9, 1995.
[2]
IETF, RFC 6176, Prohibiting Secure Sockets Layer (SSL) Version 2.0, March, 2011. DOI=http://tools.ietf.org/html/rfc6176
[3]
IETF, RFC5246 The Transport Layer Security (TLS) Protocol Version 1.2. Aug. 2008 DOI=http://tools.ietf.org/html/rfc5246
[4]
IETF RFC 4366 Transport Layer Security (TLS) Extensions, April, 2006 DOI=http://tools.ietf.org/html/rfc4366
[5]
IETF RFC 2818, HTTP Over TLS, May 2005. DOI=http://tools.ietf.org/html/rfc2818
[6]
Luke Murphey, Secure Session Management: Preventing Security Voids in Web Applications, May 2005. DOI=http://www.sans.org
[7]
Paul Johnston, Jan 2005. Authentication and Session Management on the Web, DOI=http://www.sans.org
[8]
Gunter Ollmann, Web Based Session Management Best practices in managing HTTP-based client sessions.
[9]
Zhengyi Le and Yi Ouyang and Yurong Xu and James Ford and Fillia Makedon, Preventing Unofficial Information Propagation, Proceedings of the 9th International Conference on Information and Communication Security (ICICS'07), 2007, pages 113--125.
[10]
Internet X.509 Public Key Infrastructure Certificate and CRL profile, RFC3280, 2002, April.
[11]
Ross Anderson, Two Remarks on Public-Key Cryptology, Invited lecture CCCS, DOI=http://www.cl.cam.ac.uk/users/rja14
[12]
Dan Boneh and Matthew Franklin, Identity-Based Encryption from the Weil Pairing, Proceedings of Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, 2001, volume 2139, pages 213--229.
[13]
Jae Choon Cha and Jung Hee Cheon, An Identity-Based Signature from Gap Diffie-Hellman Groups, Proceedings of Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, 2003, volume 2567, pages 18--30.
[14]
Clifford Cocks, An Identity Based Encryption Scheme based on Quadratic Residues, Proceedings of Cryptography and Coding, 8th IMA International Conference, 2001, volume 2260, pages 360--363.
[15]
Xuhua Ding and Gene Tsudik, Simple Identity-Based Cryptography with Mediated RSA, Cryptographer's Track RSA Conference(CT-RSA'03), 2003, Springer.
[16]
Xuhua Ding and Daniele Mazzocchi and Gene Tsudik, Experimenting with Server-Aided Signature, Network and Distributed System Security Symposium, 2002, Springer.
[17]
Shuo Guo, Ziguo Zhong, Tian He: FIND: faulty node detection for wireless sensor networks. SenSys 2009: 253--266

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
PETRA '12: Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments
June 2012
307 pages
ISBN:9781450313001
DOI:10.1145/2413097
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • U of Tex at Arlington: U of Tex at Arlington

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 June 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. secure data sharing
  2. short-lived session key

Qualifiers

  • Research-article

Conference

PETRA2012
Sponsor:
  • U of Tex at Arlington

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 85
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media